Author:
Gencer Adem Efe,Basu Soumya,Eyal Ittay,van Renesse Robbert,Sirer Emin Gün
Publisher
Springer Berlin Heidelberg
Reference70 articles.
1. 21.CO. Bitnodes.
https://bitnodes.21.co/
. Accessed June 2017
2. Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: routing attacks on cryptocurrencies. arXiv preprint
arXiv:1605.07524
(2016)
3. Benben Team. Benben.
http://benben.com.gh/
. Accessed Oct 2016
4. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in Bitcoin P2P network. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS), pp. 15–29 (2014)
5. Bitcoin Community. Bitcoin source.
https://github.com/bitcoin/bitcoin
. Accessed June 2017
Cited by
204 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献